ImageMagick Code Execution (CVE-2016-3714)
imagick_builder.py = Simple Payload Builder to Exploit CVE-2016-3714
imagick_bypass_shell.php = PHP based web shell leveraging the PHP imagick extension wrapper to bypass disabled functions
Few Images of things working:
Payload Builder:
imagick payload vs vBulletin 4.x w/ImageMagick Enabled:
server side after payload triggers:
Web Shell:
Command Execution:
File Read:
-
Notifications
You must be signed in to change notification settings - Fork 33
Hood3dRob1n/CVE-2016-3714
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
ImaegMagick Code Execution (CVE-2016-3714)
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published